FortiToken 2FA Solutions Guide
FortiToken 2FA Solutions Guide
FortiToken 2FA Solutions Guide
Solutions Guide
Solutions Guide
November 16, 2012
33-100-188900-20121116
Copyright 2012 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are
registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks
of Fortinet. All other product or company names may be trademarks of their respective owners.
Performance metrics contained herein were attained in internal lab tests under ideal conditions,
and performance may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment
by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the
extent Fortinet enters a binding written contract, signed by Fortinets General Counsel, with a
purchaser that expressly warrants that the identified product will perform according to the
performance metrics herein. For absolute clarity, any such warranty will be limited to
performance in the same ideal conditions as in Fortinets internal lab tests. Fortinet disclaims in
full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise
this publication without notice, and the most current version of the publication shall be
applicable.
Technical Documentation
docs.fortinet.com
Knowledge Base
kb.fortinet.com
support.fortinet.com
Training Services
training.fortinet.com
FortiGuard
fortiguard.com
Document Feedback
Table of Contents
Introduction....................................................................................................... 2
Motivation for strong authentication........................................................................ 2
Overview of two-factor authentication..................................................................... 2
Fortinet authentication server and token types ....................................................... 3
FortiGate ............................................................................................................ 3
FortiAuthenticator .............................................................................................. 3
Page 1
Introduction
This guide covers various usage and deployment scenarios for Fortinets range of two-factor
authentication solutions.
Page 2
FortiGate
The FortiGate unit is generally specified as the authentication server in the case where a single
FortiGate unit is deployed for VPN. This would be for relatively small installations. The big
advantage of using a FortiGate unit is that the Authentication Sever functionality is built-in; there
is no additional hardware or software to purchase resulting in significant cost saving. Tokens are
specific to each instance of the FortiGate unit. The FortiGate unit authentication also allows the
integration with existing AD/LDAP directory servers.
FortiAuthenticator
FortiAuthenticator is generally specified as the authentication server in the case where multiple
FortiGate units and other Radius client/NAS devices are deployed. FortiAuthenticator is a full
function stand-alone RADIUS Authentication server. Tokens can be used for any
VPN/Firewall/NAS RADIUS Client. FortiAuthenticator also includes native LDAP server
functionality as well as the ability to integrate with external LDAP directories. Further, the REST
API of FortiAuthenticator makes it possible to add two factor authentication to your
non-RADIUS based web applications. Finally, FortiAuthenticator has a user self service portal
that can minimize touch points in the provisioning process as well as Help Desk calls.
Page 3
FortiToken solutions
Fortinets strong authentication servers and clients provide strong, two-factor authentication for
remote users on laptops, browsers, tablets and Smartphones solutions that are secure, easy
and affordable.
Fortinet offers a variety of security tokens in the FortiToken product line in addition to a choice
of Authentication Server platforms. They can be used to securely authenticate to a PC, Server,
network, application or website. FortiToken solutions can be deployed for a single purpose,
such as remote VPN access. A single token can also be used for multiple purposes, for
example, LAN login and VPN login.
Fortinet solutions are standards based and will minimize IT labor and cost-of-ownership
through simple installation, tokens that dont expire, end-user self-service, and out-of-the-box
integration into your existing network infrastructure. They supports a flexible range of two-factor
OATH compliant, time-based, OTP hardware tokens, soft tokens for mobile devices, SMS and
email options and client certificates.
The benefits of Fortinet strong authentication for the enterprise include:
Mitigating risk of weak, static password authentication, which is shown to lead to breaches,
malware attacks, and policy violations.
Low (zero) cost two-factor authentication options
Increasing productivity with secure connections to data and applications from any location
through a variety of devices and authentication methods to suit the enterprise and their
users.
Ensuring compliance with regulatory standards
Lowering costs associated with equipment, compliance, help desk calls, implementation,
administration, and forced token replacement.
Trusted by large and small businesses, governments, law enforcement and banks around the
world, Fortinet, with its strong authentication solutions for remote access, will provide the
security you need for your organization.
The table below shows the possible combinations of Fortinet Authentication Servers and
Tokens that can be used to solve your two-factor authentication problem. Your specific criteria
will dictate the optimal choice for your environment.
Table 1: Combinations of Fortinet authentication servers and tokens for two-factor
authentication
Authentication Server
Token (Client)
Certificate Authority
FortiGate
FortiToken-200/FortiToken Mobile
N/A
FortiGate
FortiToken-200CD/FortiToken Mobile
N/A
FortiAuthenticator
FortiToken-200/FortiToken Mobile
N/A
FortiAuthenticator
FortiToken-200CD/FortiToken Mobile
N/A
FortiToken-300
FortiAuthenticator
The determination of the solution footprints above is based on the fact that FortiGate has a
built-in authentication server function that comes standard with every FortiOS device and virtual
Page 4
Applications Requiring
External Authentication
Server
(FortiAuthenticator) with
Authentication API
Certificate Based
Applications Not
Requiring External
Authentication
Server
Fortinet device
and apps
FortiManager
Admin login
VPN
FortiMail Admin
login
Cisco ASA
Windows Smartcard
login
Apache with
mod-auth-radius
module
Homegrown networked
applications
Microsoft Outlook
web application
Page 5
Fortinet non-RADIUS devices, third Party RADIUS devices and other Non-RADIUS
clients/applications that need to authenticate users: FortiAuthenticator is required
enabling two-factor authentication for non-FortiGate clients.
Regulatory Compliance: Industry regulations will require you to comply with best practices
for protecting access to resources and often specify two-factor authentication.
BYOD Policy: If your policy allows end-users Smartphones for business applications,
whether company issued or BYOD, you may consider using the FortiToken Mobile as an
alternative to hard tokens.
Multiple tokens per end users: If you want to assign separate tokens for access to various
systems, you dont want to require your end-users to carry additional hardware. Mobile
apps, such as FortiToken Mobile, allow users to install multiple tokens on the same device.
FortiGate plus
FortiToken-200
and/or FortiToken
Mobile
FortiAuthenticator
FortiGate plus
FortiToken-200CD
and/or FortiToken
Mobile
FortiAuthenticator
plus
FortiToken-200
and/or FortiToken
Mobile
FortiAuthenticat
or plus
FortiToken-200
and/or
FortiToken
Mobile
FortiToken-300
plus
FortiAuthenticator
(CA)
Small
Small, Medium
Large
medium, Large
Any
Number of FortiGate
devices (or HA clusters)
that need to
authenticate users
One
Few
Any
Any
Any
Need to authenticate
users to third party
devices, applications
and/or web sites
No
No
Yes
Yes
Yes
Regulatory compliance
required
Yes
Yes
Yes
Yes
Yes
Allowed (for
FortiToken Mobile
Allowed (for
FortiToken Mobile
Allowed (for
FortiToken Mobile
Allowed (for
FortiToken
Mobile
N/A
Yes (with
FortiToken
Mobile)
Yes
BYOD polices
Yes (with
Yes (with
Yes (with
FortiToken Mobile) FortiToken Mobile) FortiToken Mobile)
The remainder of this section provides more detailed context for each of the types of FortiToken
solutions.
Page 6
Page 7
If you want to install the same instance of FortiToken on multiple FortiGate units or FortiGate HA
clusters using the built-in FortiGate authentication server to authenticate users, then you should
use the FortiToken-200CD tokens. However, care must be taken to make sure that the user and
token configurations are consistent across the FortiGate units. If you are setting up so that a
given user can use his/her token to authenticate on multiple FortiGate units, then you must
make sure that changes made on one FortiGate with respect to token configuration are in sync
and compatible with the other FortiGate devices.
The FortiToken-200 by default has a one-time activation limit via the secure Fortinet
cloud-based seed server so that it can be activated and installed on only one FortiGate unit.
However, because the FortiToken-200CD activation file is encrypted and in your control, you
can securely activate the tokens repeatedly across multiple FortiGate devices without worry.
Therefore, the FortiToken-200CD solution applies to environments where separate FortiGate
units are deployed with no centralized authentication server, and users must have two-factor
authentication access to each FortiGate unit. Another reason to use FortiToken-200CD is if you
have any concern or network limitation that would prevent you from using Fortinets FortiGuard
to activate your tokens.
If your BYOD policy allows end users to use their own Smartphones, or if the organization
issues Smartphones, they can be provisioned with FortiToken Mobile tokens. FortiToken Mobile
tokens also enable users to carry multiple tokens all on the same device.
Page 8
Page 9
advantage of effectively defending against insiders, USB Smartcards themselves are highly
secure in that the private keys stored in the hardware cannot be exported or otherwise
extracted.
PKI certificate deployment has traditionally been difficult and expensive. Fortinet makes it much
easier and more cost-effective through the introduction of FortiAuthenticator, which can be
used in conjunction with the FortiToken-300 USB Smartcard to deploy a simple, turnkey, single
vendor solution that enables enterprises turn up a scalable PKI infrastructure and issue
certificates to end users in short order. The benefits of the Fortinet PKI Smartcard solution are:
Reduced risk of network attacks, compliance issues and financial liabilities with
standards-based, government strong authentication
Increased productivity and adoption with convenient and simple user experience
Enhanced ROI with one universal client certificate for more efficient certificate management,
and faster deployment of authenticating networks and apps.
Figure 3: Authentication with FortiToken-300
Summary
Two factor authentication is necessary today to protect your network. There are many choices
in vendors and technologies to solve your two-factor authentication problem. Fortinet, the
leader in network security, brings you a wide spectrum of choices in client and server
components to tailor a solution for your unique needs. With solutions from zero cost server
function to hardware and mobile tokens supporting third party systems, Fortinet has a solution
to suit any requirement and budget.
Page 10